You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/patterns.md
+124-8Lines changed: 124 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,7 +15,7 @@ module "alb" {
15
15
# Truncated for brevity ...
16
16
17
17
listeners = {
18
-
ex-http-https-redirect = {
18
+
http_https_redirect = {
19
19
port = 80
20
20
protocol = "HTTP"
21
21
redirect = {
@@ -39,7 +39,7 @@ module "alb" {
39
39
# Truncated for brevity ...
40
40
41
41
listeners = {
42
-
ex-fixed-response = {
42
+
fixed_response = {
43
43
port = 80
44
44
protocol = "HTTP"
45
45
fixed_response = {
@@ -52,6 +52,122 @@ module "alb" {
52
52
}
53
53
```
54
54
55
+
### Auth0 authenticated HTTPS Listener
56
+
57
+
The configuration snippet below creates an HTTPS listener that utilizes [Auth0](https://www.auth0.com) to secure access. Read more in [this post](https://medium.com/@sandrinodm/securing-your-applications-with-aws-alb-built-in-authentication-and-auth0-310ad84c8595).
client_secret = "secret123" # a data source would be good here
79
+
}
80
+
}
81
+
}
82
+
}
83
+
```
84
+
85
+
### Okta authenticated HTTPS Listener
86
+
87
+
The configuration snippet below creates an HTTPS listener that utilizes [Okta](https://www.okta.com/) to secure access. Read more in [this post](https://medium.com/swlh/aws-alb-authentication-with-okta-oidc-using-terraform-902cd8289db4).
client_secret = "secret123" # a data source would be good here
109
+
}
110
+
}
111
+
}
112
+
}
113
+
```
114
+
115
+
### Google authenticated HTTPS Listener
116
+
117
+
The configuration snippet below creates an HTTPS listener that utilizes Google to secure access. See the [iap_client resource](https://registry.terraform.io/providers/hashicorp/google/latest/docs/resources/iap_client) in the Google provider if you want to create this configuration in Terraform. Remember to set your google consent screen to internal to only allow users from your own domain.
The configuration snippet below creates an HTTPS listener that utilizes [Amazon Cognito](https://aws.amazon.com/cognito/) to secure access. See the [iap_client resource](https://registry.terraform.io/providers/hashicorp/google/latest/docs/resources/iap_client) in the Google provider if you want to create this configuration in Terraform. Remember to set your google consent screen to internal to only allow users from your own domain.
0 commit comments